IT 205 WK 5 Riordan Manufacturing
IT 205 WK 5 Riordan Manufacturing
Popular in Course
verified elite notetaker
Popular in Department
This 0 page Study Guide was uploaded by kimwood Notetaker on Monday November 9, 2015. The Study Guide belongs to a course at a university taught by a professor in Fall. Since its upload, it has received 17 views.
Reviews for IT 205 WK 5 Riordan Manufacturing
Report this Material
What is Karma?
Karma is the currency of StudySoup.
You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!
Date Created: 11/09/15
CURRENT EVENTS Jarad Krum SSC471 AMU In today s world there is a lot to worry about From getting to work on time or to making sure your have the right life plan However there is now in today s modern world the ever present and ever worrying danger that is the internet In today s world most of the comers are taken place in cyber space This of course requires the information of your personal bank account to be out there in someone s personal data base And these data bases are being hacked and taken advantage of at an alarming rate This week we were asked to research and give a report on the ADOBE break in and what happened during that attack The attack occurred several weeks ago in October 2014 According to the new article Several variants of the attack have been distinguished so far They vary in the theme of the email the sender address and the used exploits Still they all have the same goal to lure the user into opening the corrupted attached file that claims to be an invoice in the form of a PDF file The malicious attachment Invoice621785pdf contains exploits for vulnerabilities in Adobe Reader This makes computer users With older and unpatched versions of the reader the perfect target Berta B 2014 This is an old form of attack I remember from the early 90 s When you would get an email that claimed to have something from a relative and you opened it up and it destroyed your computer One of the versions is a typical Trojan that is sent to collect the information bout the person like their credit card number and other personal information and send it back to the hacker that is sending out this virus Reportedly it was adapted to steal also other types of credentials lately Experts reveal that the Trojan has been improved recently and is currently using its own SSL certificate that provides it With secure communication With the CampC server and hide malicious traffic Berta B 2014 This is new however and is in my opinion very disturbing A virus wit that can hide malicious traffic is to say the least very bad Another article from NBC new states The software maker also said that hackers had stolen part of the source code to Photoshop editing software that is widely used by professional photographers The company disclosed the breach on Oct 3 saying attackers took credit card information and other data from nearly 3 million customers39 accounts Adobe also said that the hackers accessed an undisclosed number of Adobe IDs and encrypted passwords that were stored in a separate database On Tuesday it revealed that about 38 million records from that database were stolen Finkel 2014 It was also stated that there was a loss of test passwords and ids for other test account data along with invalid Adobe IDs inactive Adobe IDs Adobe IDs with invalid encrypted passwords The spokeswoman states while the information would have been encrypted the hacker would probably be able to break their algorithm Personal I think that this is a despicable attack on the ADOBE Though commendation has to be given to the way they accomplished this attack and I suppose we now know more than we did and what to expect next time something like this happens again And while it was a terrible thing that happened it was a good learning experience and sometimes we as a people need disasters to happen to help us grow and experience more In conclusion the attack that happened to ADOBE was horrible yes genius in its own way The code that was deployed was very complexed and they managed to make off with a lot of information This was an effective and disturbing code that was used on this attack And while I am sure there is call for blood for the person or group that caused tis attack it would be far more beneficial to employ them as coders to prevent such an attack from occurring again References Berta B New Dyre Banking Trojan Exploiting Adobe Reader Vulnerability December 2014 httpsensorstechforumcomnewdyrebankingtrojanexploitingadobe readervulnerability Finkel John Adobe Hacker attack much bigger than previously disclosed httpwwwnbcnewscomtechsecurityadobehackerattackmuchbigger previouslydisclosedf8C11493155 Neal Ryan Adobe Hack Worse Than Reported Hackers Steal 38 Million Customers39 Personal Data Photoshob Source Code December 2014 httpwwwibtimescomadobehackworsereportedhackerssteaI38million customerspersonaIdataphotoshopsourcecode
Are you sure you want to buy this material for
You're already Subscribed!
Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'